Information Security and Privacy in Railway Transportation: a systematic Review
Download 1.44 Mb. Pdf ko'rish
|
sensors-22-07698-v3
2. Research Methodology
Our review methodology was based on the five phases of vom Brocke et al. [ 8 ] for a systematic literature review. More precisely, the phases are the following: (i) definition of the review scope, (ii) conceptualisation of the topic, (iii) literature search, (iv) literature analysis and synthesis and (v) definition of a research agenda. 2.1. Definition of the Review Scope We aimed to extract and analyse the current state of the art in techniques, protocols and technologies related to information security and privacy for railway transportation. More specifically, the scope of the review is defined according to the taxonomy proposed by Cooper [ 9 ]: • Focus: To gain a broad view of the field, the literature review focuses on all types of academic articles, ranging from theoretical approaches to more practical solutions. • Goal: This review investigates which procedures and solutions have been proposed by the scientific community to address the security and privacy aspects of railway transportation, which are the challenges identified in the field, and which are the future research directions. • Organisation: The review is organised using a conceptual structure, i.e., grouping sim- ilar ideas from different authors in order to easily guide the reader through the topic. • Perspective: In this review, we adopt a neutral but critical position regarding the articles studied from the literature. • Audience: It is intended for researchers, practitioners and stakeholders in the field of railway transportation, information security and/or privacy protection. • Coverage: This literature review provides exhaustive coverage of the available, pub- lished scientific literature. For the sake of completeness, our approach also relies on several research questions pertinent to cyber-security and privacy protection, which are aligned to the specific ob- jectives of our article (see Table 1 ). Based on these research questions, we performed a thorough analysis of the available literature and analysed the most well-known solutions, along with their challenges. |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling